The postings on this site solely reflect the personal views of each author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management. IBM reserves the right to remove content deemed inappropriate.

Data
is
everywhere.
And
with
IBM's
help,
savvy
organizations
are
discovering
the
value
of
using
big
data
technologies
to
collect,
monitor,
detect,
manage,
analyze
and
report
on
security
data
in
a
manner
not
previously
possible.Click
on
the
image
to
open
the
picture
story:
... [ + Read more ]

As
the
third
day
came
to
a
close
on
Infosecurity
Europe
and
our
stand
is
now
slowly
being
taken
down,
I
wanted
to
provide
some
key
highlights
of
the
whiteboarding
sessions
that
happened
live
on
our
interactive
graffiti
wall.
How
to
Protect
your
Crown
Jewels
First
up
was
David
Gray
from
our
... [ + Read more ]

IBM
Security
Systems
had
another
great
day
at
Infosecurity
Europe,
with
good
attendance
at
our
stand
for
the
hourly
interactive
graffiti
whiteboarding
sessions,
which
covered
all
the
hottest
security
topics.
In
our
workshops
we
had
four
successful
sessions,
allowing
attendees
insights
into
Security
Intelligence,
Mobile
and
Future
thinking.
Here
are
my
... [ + Read more ]

Wow,
the
end
of
a
great
first
day
at
Infosecurity
Europe.
Our
stand
was
very
bright
and
impactful
and
with
our
industry
experts,
business
partners
and
action
packed
agenda,
it
has
been
truly
engaging
day!
We
had
four
workshops
across
the
day
and
below
are
the
key
points
that
I
thought
... [ + Read more ]

NEW!
IBM
X-Force
2012
Annual
Trend
and
Risk
ReportTwice
a
year
since
the
late
1990s,
IBM’s
X-Force
Research
and
Development
team
releases
a
trend
and
risk
report
including
content
collected
from
dozens
of
thought
leaders
across
the
company.
Its
findings,
analyses
and
predictions
come
from
working
with
our
thousands
of
... [ + Read more ]

You
may
have
‘Big
Data’
and
not
know
it…
can
you
protect
it?
To
many
security
executives
the
word
“Big
Data”
seems
to
being
something
that
someone
else
has
and
thus
not
applicable
to
ones
own
enterprise.
Many
Security
managers
assume
that
their
own
data-center
is
traditional
and
that
... [ + Read more ]

Post
by
Vikash
Abraham,
Product
Marketing
Manager
for
IBM
Security
Solutions
While
Cloud
has
been
clearly
identified
as
the
next
step
to
IT
optimization,
essential
for
increased
performance
and
cost
reduction,
many
of
us
are
in
a
haze
when
it
comes
to
the
fundamental
security
measures
required.
Our
fears
related
to
cloud
... [ + Read more ]

This
is
an
excerpt
from
a
post
on
the
Q1
Labs
Security
Intelligence
blog,
contributed
by
Michael
Applebaum,
Director
of
Product
&
Segment
Marketing
at
IBM
Security
Systems.
You
can
follow
him
on
Twitter
at
@ma08.
If
you
want
to
skate
to
where
the
puck
is
going
in
security
today,
it’s
... [ + Read more ]

This
post
was
contributed
by
Nick
Harlow,
Product
Manager
-
Server
Security
and
Security
Content
Analysis
for
IBM
Security.
Today’s
complex
information
technology
(IT)
environments
consist
of
many
systems,
connected
to
serve
the
needs
of
a
given
organization.
In
order
to
bring
order
and
governance
to
this
complexity,
IT
architects
... [ + Read more ]

This
post
is
contributed
by
Paul
Kaspian,
Senior
Product
Marketing
Manager
for
IBM
Security.
In
network
security
we
spend
a
lot
of
time
looking
at
threats
coming
into
our
organizations
from
the
outside.
This
makes
a
lot
of
sense
considering
the
fact
that
our
networks
are
under
siege
from
increasingly
... [ + Read more ]

This
post
was
contributed
by
Luis
Casco-Arias,
Senior
Market
Manager
for
IBM
Security.
In
case
you
missed
it,
the
culmination
of
the
evolution
of
IT
security
is
“Security
Intelligence”.
In
this
era
of
rapid
data
explosion,
consumerization
of
IT,
IT
perimeter
openness
and
expansion,
and
attack
sophistication,
IT
organizations
will
... [ + Read more ]

This
post
is
written
by
John
Burnham,
Strategic
Communications
for
IBM
Security.
Last
week,
IBM
Security
announced
the
release
10
new
products
designed
to
help
customers
resolve
security
challenges
as
they
leverage
cloud
services,
mobility,
and
Big
Data
analytics.
This
is
a
major
milestone,
as
it
is
the
largest
release
of
... [ + Read more ]

This
post
was
contributed
by
Michael
Applebaum,
Director
of
Product
Marketing
at
Q1
Labs,
an
IBM
Company.
Connect
with
Michael
on
Twitter
and
LinkedIn.
Not
every
security
breach
is
the
result
of
an
advanced
persistent
threat
(APT).
In
fact,
only
a
small
fraction
probably
are.
But
the
industry
is
buzzing
... [ + Read more ]

Did
you
know
that
92%
of
breached
organizations
don’t
know
they’ve
been
breached?
I
follow
a
lot
of
security
industry
news,
so
it’s
no
surprise
to
me
that
every
morning
I
see
alerts
of
new
breaches,
vulnerabilities
and
“hacktivist”
style
threats.
But
what
does
surprise
me
is
the
impact
this
news
... [ + Read more ]

Guest
post
by
Dr.
Jean
Paul
Ballerini,
Sales
Enablement
for
IBM
Security. There
are
few
industries
untouched
by
multiple
regulations;
businesses
contend
with
regulations
that
control
their
accounting,
IT
security,
operations,
and
so
on
and
so
forth
–
in
addition
to
those
that
are
sector
specific.
But
all
of
this
is
... [ + Read more ]